Hi all,
Today we are releasing two new release candidates to address CVE-2016-9587,
which we are removing from embargo today:
2.1.4 RC1
2.2.1 RC3
CVE-2016-9587 is rated as HIGH in risk, as a compromised remote system being managed
via Ansible can lead to commands being run on the Ansible controller (as the user
running the ansible or ansible-playbook command).
If you have the ability, please test the above release candidates so that we can get
the final releases out as quickly as possible.
Finally, thanks to the security team at Computest, who did an amazing job of finding
the flaws and creating an excellent set of tests to reproduce them for us.
Thanks, and let us know if you run into any problems with the above release candidates!